[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    Re: [RHSA-1999:017-01] Potential security problem in Red Hat 6.0
From:       sillyhead <cdale () HOME ! ISOLNET ! COM>
Date:       1999-06-25 19:17:53
[Download RAW message or body]

Hi!
If you will read further down, you will see this:
7. Problem description:
A change to 32 bit uid_t's within glibc 2.0.x
has opened a potential hole in root-squashing.
sillyhead


On Fri, 25 Jun 1999, Andreas Bogk wrote:

> Raymond Dijkxhoorn <raymond@THRIJSWIJK.NL> writes:
>
> > 7. Problem description:
> >
> > Several potential buffer overruns have been corrected within the net-tools
> > package.
>
> Very helpful. I'm running LinuxPPC here, which is partly based on
> RedHat. Could someone from RedHat please identify the programs in
> question, their version numbers, the history of the code or something
> else which allows me to find out whether I'm affected or not?
>
> No, Im not asking "gimme the xpl0itz". Far from it. But such
> announcements just don't help me. Instead they give me the uneasy
> feeling that out there are people which know about a security problem
> on my machine and don't tell me about it.
>
> Andreas
>
> --
> "We show that all proposed quantum bit commitment schemes are insecure because
> the sender, Alice, can almost always cheat successfully by using an
> Einstein-Podolsky-Rosen type of attack and delaying her measurement until she
> opens her commitment." ( http://xxx.lanl.gov/abs/quant-ph/9603004 )
>

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic